| 000 | 01936 a2200277 4500 | ||
|---|---|---|---|
| 008 | 210812b ||||| |||| 00| 0 eng d | ||
| 020 | _a9780071823074 | ||
| 020 | _a9780071823074 020 0071823077 | ||
| 050 |
_aQA76.9.A25 _bE39 2017 |
||
| 100 | _aElisan, Christopher C. | ||
| 245 |
_aHacking exposed : _bmalware and rootkits : security secrets & solutions / _cChristopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters |
||
| 250 | _a2nd | ||
| 260 |
_bMcGraw-Hill Education, _c2017 _aNew York : |
||
| 300 |
_axxii, 360 pages : _billustrations ; _c24 cm |
||
| 500 | _aRevised edition of: Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions / Michael Davis, Sean Bodmer, Aaron Lemasters. 2010 | ||
| 505 | _aIncludes index | ||
| 505 | _aPart I : Malware. Malware propagation -- Malware functionality -- Part II : Rootkits. User-mode rootkits -- Kernel-mode rootkits -- Virtual rootkits -- The future of rootkits -- Part III : Prevention technologies. Antivirus -- Host protection systems -- Host-based intrusion prevention -- Rootkit detection -- General security practices | ||
| 520 | _a"Fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop -up and phising exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology."--Back cover | ||
| 650 | _aComputer security | ||
| 650 | _a650 0 Computer networks|xSecurity measures 650 0 Malware (Computer software) 650 0 Rootkits (Computer software) | ||
| 700 |
_aDavis, Michael, _d1982- |
||
| 700 | _aBodmer, Sean, | ||
| 700 | _aLeMasters, Aaron, | ||
| 760 | _bOnline version:|aDavis, Michael, 1982-|tHacking exposed. |dNew York : McGraw-Hill Education, [2017]|z9780071825757 |w(DLC) 2016049606 | ||
| 942 |
_cBK _2lcc |
||
| 999 |
_c56809 _d56809 |
||